[sr-dev] [kamailio] Core dump: SIGSEGV in pv_get_branchx_helper after 0f8da1746e79066a423b0808195c061701bb29da (#141)

Anthony Messina notifications at github.com
Sun Apr 26 04:07:20 CEST 2015


After 0f8da1746e79066a423b0808195c061701bb29da, Kamailio dumps core:
```

Thread 1 (Thread 0x7f0d1aee0700 (LWP 2490)):
#0  0x00007f0d13b2c58e in pv_get_branchx_helper (msg=0x7f0d19fde300, param=0x7f0d19d78f88, res=0x7fff3b72ade0, btype=0) at pv_branch.c:52
#1  0x00007f0d13b2cb82 in pv_get_branchx (msg=0x7f0d19fde300, param=0x7f0d19d78f88, res=0x7fff3b72ade0) at pv_branch.c:99
#2  0x00000000005aa946 in pv_get_spec_value (msg=0x7f0d19fde300, sp=0x7f0d19d78f70, value=0x7fff3b72ade0) at pvapi.c:1289
#3  0x00000000004225a5 in rval_get_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, i=0x7fff3b72b058, rv=0x7f0d19d78f68, cache=0x0) at rvalue.c:966
#4  0x00000000004264b3 in rval_expr_eval_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, res=0x7fff3b72b058, rve=0x7f0d19d78f60) at rvalue.c:1906
#5  0x0000000000426912 in rval_expr_eval_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, res=0x7fff3b72b490, rve=0x7f0d19d79d60) at rvalue.c:1939
#6  0x000000000046126f in do_action (h=0x7fff3b72c390, a=0x7f0d19d7b1a0, msg=0x7f0d19fde300) at action.c:1029
#7  0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d7b1a0, msg=0x7f0d19fde300) at action.c:1548
#8  0x0000000000461694 in do_action (h=0x7fff3b72c390, a=0x7f0d19d7b2c0, msg=0x7f0d19fde300) at action.c:1044
#9  0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d77bf0, msg=0x7f0d19fde300) at action.c:1548
#10 0x000000000045e47c in do_action (h=0x7fff3b72c390, a=0x7f0d19d539c8, msg=0x7f0d19fde300) at action.c:677
#11 0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d480c0, msg=0x7f0d19fde300) at action.c:1548
#12 0x000000000046de3b in run_top_route (a=0x7f0d19d480c0, msg=0x7f0d19fde300, c=0x0) at action.c:1634
#13 0x000000000057114c in receive_msg (
    buf=0x2a92770 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 69\r\nf: \"User\" <sip:user at example.co"..., 
    len=1627, rcv_info=0x7f0d0b497e78) at receive.c:196
#14 0x00000000005f1a03 in receive_tcp_msg (
    tcpbuf=0x7f0d0b498150 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 70\r\nf: \"User\" <sip:user at example.co"..., len=1627, rcv_info=0x7f0d0b497e78, con=0x7f0d0b497e60) at tcp_read.c:1247
#15 0x00000000005f3139 in tcp_read_req (con=0x7f0d0b497e60, bytes_read=0x7fff3b72c780, read_flags=0x7fff3b72c778) at tcp_read.c:1401
#16 0x00000000005f6018 in handle_io (fm=0x7f0d19fe6df0, events=1, idx=-1) at tcp_read.c:1624
#17 0x00000000005e9e02 in io_wait_loop_epoll (h=0xa31740 <io_w>, t=2, repeat=0) at io_wait.h:1061
#18 0x00000000005f6fbb in tcp_receive_loop (unix_sock=36) at tcp_read.c:1733
#19 0x00000000004e8da2 in tcp_init_children () at tcp_main.c:4787
#20 0x0000000000511e8e in main_loop () at main.c:1658
#21 0x00000000005173e9 in main (argc=7, argv=0x7fff3b72cca8) at main.c:2533
#0  0x00007f0d13b2c58e in pv_get_branchx_helper (msg=0x7f0d19fde300, param=0x7f0d19d78f88, res=0x7fff3b72ade0, btype=0) at pv_branch.c:52
        idx = 0
        idxf = 0
        br = 0x0
        __FUNCTION__ = "pv_get_branchx_helper"
#1  0x00007f0d13b2cb82 in pv_get_branchx (msg=0x7f0d19fde300, param=0x7f0d19d78f88, res=0x7fff3b72ade0) at pv_branch.c:99
No locals.
#2  0x00000000005aa946 in pv_get_spec_value (msg=0x7f0d19fde300, sp=0x7f0d19d78f70, value=0x7fff3b72ade0) at pvapi.c:1289
        ret = 0
        __FUNCTION__ = "pv_get_spec_value"
#3  0x00000000004225a5 in rval_get_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, i=0x7fff3b72b058, rv=0x7f0d19d78f68, cache=0x0) at rvalue.c:966
        r_avp = 0x3519fde300
        avp_val = {n = 997371516, s = {s = 0x7fff3b72ae7c "\201\001", len = 189443664}, re = 0x7fff3b72ae7c}
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        tmp = {s = 0x7f0d19d4fa45 "caller_conid)", len = 12}
        s = 0x0
        r = 32525
        ret = 0
        destroy_pval = 0
        __FUNCTION__ = "rval_get_int"
#4  0x00000000004264b3 in rval_expr_eval_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, res=0x7fff3b72b058, rve=0x7f0d19d78f60) at rvalue.c:1906
        i1 = 7229469
        i2 = 0
        ret = -1
        c1 = {cache_type = 436069784, val_type = 32525, c = {avp_val = {n = 0, s = {s = 0x0, len = 8388608}, re = 0x0}, pval = {rs = {s = 0x0, len = 8388608}, ri = 5868128, flags = 0}}, 
          i2s = "h\020\034\000\000\000\000\000\240u&\000\000\000\000\000\020C.\000\000"}
        c2 = {cache_type = 436069784, val_type = 32525, c = {avp_val = {n = 997372888, s = {s = 0x7fff3b72b3d8 "", len = 434532608}, re = 0x7fff3b72b3d8}, pval = {rs = {s = 0x7fff3b72b3d8 "", len = 434532608}, ri = 6414460, 
              flags = 0}}, i2s = "\000\257r;\377\177\000\000\020\240\317\031\r\177\000\000@\257r;\377\177"}
        rv1 = 0x5aa946 <pv_get_spec_value+730>
        rv2 = 0x7fff00000002
        __FUNCTION__ = "rval_expr_eval_int"
#5  0x0000000000426912 in rval_expr_eval_int (h=0x7fff3b72c390, msg=0x7f0d19fde300, res=0x7fff3b72b490, rve=0x7f0d19d79d60) at rvalue.c:1939
        i1 = 7229469
        i2 = 0
        ret = -1
        c1 = {cache_type = 436069784, val_type = 32525, c = {avp_val = {n = 0, s = {s = 0x0, len = 8388608}, re = 0x0}, pval = {rs = {s = 0x0, len = 8388608}, ri = 5868128, flags = 0}}, 
          i2s = "h\020\034\000\000\000\000\000\240u&\000\000\000\000\000\020C.\000\000"}
        c2 = {cache_type = 436069784, val_type = 32525, c = {avp_val = {n = 997373176, s = {s = 0x7fff3b72b4f8 "\376\"B", len = 433541776}, re = 0x7fff3b72b4f8}, pval = {rs = {s = 0x7fff3b72b4f8 "\376\"B", len = 433541776}, 
              ri = 6414460, flags = 0}}, i2s = " \260r;\377\177\000\000\020\240\317\031\r\177\000\000`\260r;\377\177"}
        rv1 = 0x7f0d19cfaee8
        rv2 = 0x5
        __FUNCTION__ = "rval_expr_eval_int"
#6  0x000000000046126f in do_action (h=0x7fff3b72c390, a=0x7f0d19d7b1a0, msg=0x7f0d19fde300) at action.c:1029
        ret = -5
        v = 997373200
        dst = {send_sock = 0x7fff00000000, to = {s = {sa_family = 54547, sa_data = "V\000\000\000\000\000`/\353\031\r\177\000"}, sin = {sin_family = 54547, sin_port = 86, sin_addr = {s_addr = 0}, sin_zero = "`/\353\031\r\177\000"}, 
            sin6 = {sin6_family = 54547, sin6_port = 86, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "`/\353\031\r\177\000\000\020\240\317\031\r\177\000", __u6_addr16 = {12128, 6635, 32525, 0, 40976, 6607, 32525, 0}, 
                  __u6_addr32 = {434843488, 32525, 433037328, 32525}}}, sin6_scope_id = 434843544}}, id = 217, proto = -24 '\350', send_flags = {f = 174 '\256', blst_imask = 207 '\317'}}
        tmp = 0x0
        new_uri = 0x0
        end = 0x4260ea <rval_str_lop2+196> "\213E\354\353\035H\213E\360H\211\307\350?\237\377\377H\213E\370H\211\307\350\063\237\377\377\270"
        crt = 0x0
        cmd = 0x7f0d19d75a30
        len = 32525
        user = 433541744
        uri = {user = {s = 0x0, len = 1}, passwd = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 0}, host = {s = 0x7fff3b72b318 "\001", len = 0}, port = {
            s = 0x1c1068 <error: Cannot access memory at address 0x1c1068>, len = 1}, params = {s = 0x2e4310 <error: Cannot access memory at address 0x2e4310>, len = 2}, sip_params = {
            s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, headers = {s = 0x0, len = 0}, port_no = 46048, proto = 15218, type = 32767, 
          flags = (URI_USER_NORMALIZE | unknown: 4642612), transport = {s = 0x7f0d19eb32e6 "2201", len = 436069120}, ttl = {s = 0x7f0d19d77dc8 "7\004", len = 997372944}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len = 3}, method = {s = 0x100000004 <error: Cannot access memory at address 0x100000004>, len = 0}, lr = {s = 0x0, len = 2}, r2 = {
            s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff3b72b4f0 "\300\265r;\377\177", len = 4644211}, ttl_val = {
            s = 0x7fff3b72b420 "\002", len = 436069120}, user_param_val = {s = 0x7f0d19d77dc8 "7\004", len = 997376912}, maddr_val = {s = 0x0, len = 1}, method_val = {s = 0x2 <error: Cannot access memory at address 0x2>, 
            len = 1609495967}, lr_val = {s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, r2_val = {s = 0x0, len = 0}, gr_val = {
            s = 0xbd6909e35eeef59f <error: Cannot access memory at address 0xbd6909e35eeef59f>, len = -1874528865}}
        next_hop = {user = {s = 0x7fff3b728130 "\001", len = 2}, passwd = {s = 0x2a65610 "N", len = 4}, host = {s = 0x2aa73d0 "\v", len = 0}, port = {s = 0x13b729150 <error: Cannot access memory at address 0x13b729150>, len = 2}, 
          params = {s = 0x3ff000000442002 <error: Cannot access memory at address 0x3ff000000442002>, len = 5759326}, sip_params = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 0}, headers = {s = 0x0, 
            len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x3ff000000000000 <error: Cannot access memory at address 0x3ff000000000000>, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {
            s = 0x7fff3b72b240 "\346\062\353\031\r\177", len = 1}, maddr = {s = 0x0, len = 5}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, lr = {s = 0x7f0d19d31948 "-4\032\021\r\177", len = 442323584}, 
          r2 = {s = 0x7f0d19eb32e6 "2201", len = 1}, gr = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 3}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x7fff3b72b31c "", len = 0}, user_param_val = {
            s = 0x2a654c0 "\260U\246\002", len = 997372696}, maddr_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 435209120}, method_val = {s = 0x7fff3b72b330 "p]A", len = 0}, lr_val = {
            s = 0x2a651b0 "", len = 0}, r2_val = {s = 0x7fff3b72b320 "\020C.", len = 434844390}, gr_val = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 0}}
        u = 0x7f0d19d75a28
        port = 0
        dst_host = 0x4264b3 <rval_expr_eval_int+131>
        i = 997376912
        flags = 32767
        avp = 0x7f0d19fde300
        st = {flags = 997372256, id = 32767, name = {n = 442303656, s = {s = 0x7f0d1a5d04a8 <build_trtable+40> "\205\300\211\303\017\204\253\v", len = 997364016}, re = 0x7f0d1a5d04a8 <build_trtable+40>}, avp = 0x7fff3b728130}
        sct = 0x7fff3b72bad0
        sjt = 0x7f0d19cfa010
        rve = 0x7f0d19d79d60
        mct = 0x7f0d19eb2f98
        rv = 0x5ac443 <pv_value_destroy+182>
        rv1 = 0x7fff3b72bad0
        c1 = {cache_type = RV_CACHE_AVP, val_type = RV_NONE, c = {avp_val = {n = 4283760, s = {s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997372208}, re = 0x415d70 <_start>}, pval = {rs = {
                s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997372208}, ri = 4328630, flags = 0}}, i2s = "\000\343\375\031\r\177\000\000\220\303r;U\000\000\000\230/\353\031\r\177"}
        s = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 433041128}
        srevp = {0x2a92839, 0xd900000002}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, 
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d7b1a0, msg=0x7f0d19fde300) at action.c:1548
        t = 0x7f0d19d7b1a0
        ret = -1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#8  0x0000000000461694 in do_action (h=0x7fff3b72c390, a=0x7f0d19d7b2c0, msg=0x7f0d19fde300) at action.c:1044
        ret = 1
        v = 1
        dst = {send_sock = 0x7fff3b72baf0, to = {s = {sa_family = 21600, sa_data = "\260\023\r\177\000\000лr;\377\177\000"}, sin = {sin_family = 21600, sin_port = 5040, sin_addr = {s_addr = 32525}, sin_zero = "лr;\377\177\000"}, 
            sin6 = {sin6_family = 21600, sin6_port = 5040, sin6_flowinfo = 32525, sin6_addr = {__in6_u = {__u6_addr8 = "лr;\377\177\000\000\220\273r;\377\177\000", __u6_addr16 = {48080, 15218, 32767, 0, 48016, 15218, 32767, 0}, 
                  __u6_addr32 = {997374928, 32767, 997374864, 32767}}}, sin6_scope_id = 433398656}}, id = 32525, proto = 0 '\000', send_flags = {f = 227 '\343', blst_imask = 253 '\375'}}
        tmp = 0x7f0d19fde300 "\n"
        new_uri = 0x0
        end = 0x0
        crt = 0x19a0000002c <error: Cannot access memory at address 0x19a0000002c>
        cmd = 0x7f0d19fde300
        len = 0
        user = 436069120
        uri = {user = {s = 0x2a92610 "", len = 441878838}, passwd = {s = 0x901 <error: Cannot access memory at address 0x901>, len = 57919584}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 33188}, port = {
            s = 0x0, len = 0}, params = {s = 0x111 <error: Cannot access memory at address 0x111>, len = 2}, sip_params = {s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, headers = {
            s = 0x0, len = 0}, port_no = 47648, proto = 15218, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 4642612), transport = {s = 0x2ce244b8 <error: Cannot access memory at address 0x2ce244b8>, len = 436069120}, ttl = {
            s = 0x7f0d19d4db60 "u\003", len = 997374544}, user_param = {s = 0x2a92610 "", len = 997375248}, maddr = {s = 0xa <error: Cannot access memory at address 0xa>, len = 445328624}, method = {
            s = 0x11a8b2d10 <error: Cannot access memory at address 0x11a8b2d10>, len = 0}, lr = {s = 0xffff8000c48d45e1 <error: Cannot access memory at address 0xffff8000c48d45e1>, len = 2}, r2 = {
            s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff3b72bb30 "", len = 4644211}, ttl_val = {
            s = 0x7f0d19fde598 "{'\251\002", len = 997374864}, user_param_val = {s = 0x7f0d19d52380 "", len = 436069120}, maddr_val = {s = 0x7fff3b72baa0 "\360\272r;\377\177", len = 330321013}, method_val = {s = 0x7fff3b72bb90 "", 
            len = 433398656}, lr_val = {s = 0x7f0d19fde598 "{'\251\002", len = 436069120}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0xbd6909e34b6ef59f <error: Cannot access memory at address 0xbd6909e34b6ef59f>, len = 2}}
        next_hop = {user = {s = 0xdc5c050120 <error: Cannot access memory at address 0xdc5c050120>, len = 0}, passwd = {s = 0x7fff3b72b7a0 " \001\005", <incomplete sequence \334>, len = 0}, host = {
            s = 0x6335353a31303032 <error: Cannot access memory at address 0x6335353a31303032>, len = 811820090}, port = {s = 0x169686300 <error: Cannot access memory at address 0x169686300>, len = 1936026926}, params = {
            s = 0x656d206d6f632e74 <error: Cannot access memory at address 0x656d206d6f632e74>, len = 1852404595}, sip_params = {s = 0x6163696863206d6f <error: Cannot access memory at address 0x6163696863206d6f>, len = 28519}, 
          headers = {s = 0x7fff3b72b7e3 "om example.com chicago", len = 997373936}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 997373932), transport = {s = 0x7fff3b72b7f7 "ago", len = 0}, ttl = {
            s = 0x7f0d138af49f <_ul_sruid+31> "", len = 997376912}, user_param = {s = 0x7f0d19fde300 "\n", len = 433383416}, maddr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 3}, method = {
            s = 0x7f0d138af485 <_ul_sruid+5> "553c43b2-9ba-", len = 441917625}, lr = {s = 0x7f0d19d2bee8 "eg!\023\r\177", len = 327873669}, r2 = {s = 0x7f0d138af485 <_ul_sruid+5> "553c43b2-9ba-", len = 327873669}, gr = {
            s = 0x7f0d138af485 <_ul_sruid+5> "553c43b2-9ba-", len = 327873682}, transport_val = {s = 0x7f0d138af49f <_ul_sruid+31> "", len = 327873669}, ttl_val = {
            s = 0x6162393463333535 <error: Cannot access memory at address 0x6162393463333535>, len = 2}, user_param_val = {s = 0x7fff3b72bae0 "0\273r;\377\177", len = 6138730}, maddr_val = {
            s = 0x1a <error: Cannot access memory at address 0x1a>, len = 436069120}, method_val = {s = 0x7f0d19d4e7d8 "\002", len = 997376912}, lr_val = {s = 0x7f0d13662c85 <_reg_sruid+5> "553c43b2-9ba-1", len = 441917625}, r2_val = {
            s = 0x7ffffbad8001 <error: Cannot access memory at address 0x7ffffbad8001>, len = 325463173}, gr_val = {s = 0x7f0d13662c85 <_reg_sruid+5> "553c43b2-9ba-1", len = 4096}}
        u = 0x0
        port = 0
        dst_host = 0x42776a <rval_expr_eval_int+4922>
        i = 997376912
        flags = 32525
        avp = 0x7f0d19fde300
        st = {flags = 997375520, id = 32767, name = {n = 997376480, s = {s = 0x7fff3b72c1e0 "P\302r;\377\177", len = 435861848}, re = 0x7fff3b72c1e0}, avp = 0x7f0d09985258 <_nss_files_gethostbyname3_r+696>}
        sct = 0x7f0d19d52368
        sjt = 0x7fff3b72bb90
        rve = 0x7f0d19d786e8
        mct = 0x7f0d19d4e7d8
        rv = 0x7fff3b72b7e3
        rv1 = 0x7fff3b72c110
        c1 = {cache_type = 997373856, val_type = 32767, c = {avp_val = {n = 997374896, s = {s = 0x7fff3b72bbb0 "", len = 997373948}, re = 0x7fff3b72bbb0}, pval = {rs = {s = 0x7fff3b72bbb0 "", len = 997373948}, ri = 2, flags = 0}}, 
          i2s = "\250\200\356\031\r\177\000\000\220\003\000\000\000\000\000\000\000\274r;\377\177"}
        s = {s = 0x7f0d1aee0690 "", len = 997374768}
        srevp = {0x370, 0x7fff3b72c1c4}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, 
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#9  0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d77bf0, msg=0x7f0d19fde300) at action.c:1548
        t = 0x7f0d19d7b2c0
        ret = 1
        mod = 0x7f0d19fde300
        ms = 0
        __FUNCTION__ = "run_actions"
#10 0x000000000045e47c in do_action (h=0x7fff3b72c390, a=0x7f0d19d539c8, msg=0x7f0d19fde300) at action.c:677
        ret = -5
        v = 0
        dst = {send_sock = 0x7fff3b72c250, to = {s = {sa_family = 8246, sa_data = "d\000\000\000\000\000\060\301r;\377\177\000"}, sin = {sin_family = 8246, sin_port = 100, sin_addr = {s_addr = 0}, sin_zero = "0\301r;\377\177\000"}, 
            sin6 = {sin6_family = 8246, sin6_port = 100, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\301r;\377\177\000\000(\374\355\031\r\177\000", __u6_addr16 = {49456, 15218, 32767, 0, 64552, 6637, 32525, 0}, 
                  __u6_addr32 = {997376304, 32767, 435026984, 32525}}}, sin6_scope_id = 44641739}}, id = 0, proto = -103 '\231', send_flags = {f = 39 '\'', blst_imask = 169 '\251'}}
        tmp = 0x8 <error: Cannot access memory at address 0x8>
        new_uri = 0x7fff3b72c250 "P\303r;\377\177"
        end = 0x0
        crt = 0x2e4310 <error: Cannot access memory at address 0x2e4310>
        cmd = 0x7f0d19d2bc10
        len = 0
        user = 44640150
        uri = {user = {s = 0x7fff3b72bf90 "\300\277r;\377\177", len = 5690643}, passwd = {s = 0x7f0d19ee7d38 "H\001", len = 433037328}, host = {s = 0x603b72bfd0 <error: Cannot access memory at address 0x603b72bfd0>, len = 6414460}, 
          port = {s = 0x7fff3b72bfc0 "", len = 433037328}, params = {s = 0x7fff3b72c000 "", len = 354568398}, sip_params = {s = 0x7f0d148b895f <__FUNCTION__.11701> "relay_reply", len = 0}, headers = {
            s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 6414460}, port_no = 49152, proto = 15218, type = 32767, flags = (unknown: 433037328), transport = {s = 0x7fff3b72c040 "\"\301r;\377\177", 
            len = 354568398}, ttl = {s = 0x400001880 <error: Cannot access memory at address 0x400001880>, len = 7707808}, user_param = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 5876056}, maddr = {
            s = 0x7fff3b72c0e0 "P\302r;\377\177", len = 6518289}, method = {s = 0x2e4310 <error: Cannot access memory at address 0x2e4310>, len = 8}, lr = {s = 0x7f0d19edfc28 "\001", len = 435317920}, r2 = {
            s = 0x7fff3b72c122 "\005\005", len = 997376291}, gr = {s = 0x2a92dcb "", len = 44640241}, transport_val = {s = 0x800000000 <error: Cannot access memory at address 0x800000000>, len = 0}, ttl_val = {
            s = 0x7fff3b72c0e0 "P\302r;\377\177", len = 6396900}, user_param_val = {s = 0x419f25868 <error: Cannot access memory at address 0x419f25868>, len = 7751472}, maddr_val = {s = 0x75eaf0 <__FUNCTION__.6552> "parse_via", 
            len = 7716419}, method_val = {s = 0x500000000000040 <error: Cannot access memory at address 0x500000000000040>, len = 997376284}, lr_val = {s = 0x53b72c0f0 <error: Cannot access memory at address 0x53b72c0f0>, 
            len = 44640180}, r2_val = {s = 0x400415d70 <error: Cannot access memory at address 0x400415d70>, len = 44640185}, gr_val = {
            s = 0x2a927b9 ";rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 69\r\nf: \"User\" <sip:user at example.com>;tag=7Ww.sxy1BM1bEBSnux72q-F9v1yg1N.4\r\nt: <sip:2201 at example.com>\r\nm: \""..., len = 5}}
        next_hop = {user = {
            s = 0x2a929f7 "8VSRL8vpRGxC0Z4/ctx1JKCerX7iIA=\", uri=\"sip:2201 at example.com\", response=\"c50605eae761298f426035f0bcbe62da\"\r\nc: application/sdp\r\nl:   840\r\n\r\nv=0\r\no=- 3639001685 3639001685 IN IP4 70.194.68.80\r\ns=pjmedi"..., len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 5874648}, host = {s = 0x1bf760 <error: Cannot access memory at address 0x1bf760>, len = 2513960}, port = {
            s = 0x2e4310 <error: Cannot access memory at address 0x2e4310>, len = 4846927}, params = {s = 0x1875 <error: Cannot access memory at address 0x1875>, len = 7542472}, sip_params = {s = 0x7f0d19ee7d70 "", len = 189529744}, 
          headers = {s = 0x7fff3b72be70 "", len = 433037328}, port_no = 48816, proto = 15218, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 354568396), transport = {
            s = 0x7fff00000010 <error: Cannot access memory at address 0x7fff00000010>, len = 0}, ttl = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2}, user_param = {
            s = 0x415d70 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\240\236m", len = 997379232}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff3b72bfc0 "", len = 344419083}, lr = {
            s = 0x40000000000018 <error: Cannot access memory at address 0x40000000000018>, len = 5690643}, r2 = {s = 0x7f0d19ee7d70 "", len = 189529744}, gr = {s = 0x6600618264 <error: Cannot access memory at address 0x6600618264>, 
            len = 7662423}, transport_val = {s = 0x74ddf0 "<core>: mem/shm_mem.c", len = 6414460}, ttl_val = {s = 0x7fff3b72bf20 "", len = 433037328}, user_param_val = {s = 0x7fff3b72bf60 "\220\277r;\377\177", len = 354568398}, 
          maddr_val = {s = 0x7fff3b72bf80 "пr;`", len = 0}, method_val = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 5873880}, lr_val = {s = 0x1bfa60 <error: Cannot access memory at address 0x1bfa60>, 
            len = 2514728}, r2_val = {s = 0x2e4310 <error: Cannot access memory at address 0x2e4310>, len = 8}, gr_val = {s = 0x1874 <error: Cannot access memory at address 0x1874>, len = 4851722}}
        u = 0x2a92dcb
        port = 0
        dst_host = 0x7fff3b72cca0
        i = 5
        flags = 32525
        avp = 0x800000
        st = {flags = 44640912, id = 0, name = {n = 6414460, s = {s = 0x61e07c <fm_info+38> "H\213E\370H\213P\bH\213E\360H\211\020H\213E\360H\307@(\b", len = 997375472}, re = 0x61e07c <fm_info+38>}, avp = 0x7f0d19cfa010}
        sct = 0x7fff3b72c1b0
        sjt = 0x7f0d19cfa010
        rve = 0x7f0d19d532c8
        mct = 0x7fff3b72c170
        rv = 0x7f0d19fde300
        rv1 = 0x0
        c1 = {cache_type = 4283760, val_type = RV_ACTION_ST, c = {avp_val = {n = 5608340, s = {s = 0x559394 <process_lumps+37289> "\213\205\340\376\377\377\001E̋\205\340\376\377\377\001E\310H\213E\330H\213@\030H\211E\320\351\247.", 
                len = 0}, re = 0x559394 <process_lumps+37289>}, pval = {rs = {s = 0x559394 <process_lumps+37289> "\213\205\340\376\377\377\001E̋\205\340\376\377\377\001E\310H\213E\330H\213@\030H\211E\320\351\247.", len = 0}, 
              ri = 997375884, flags = 32767}}, i2s = "\220\277r;\377\177\000\000p}\356\031\r\177\000\000\000\000\000\000\000"}
        s = {
          s = 0x2a92a90 "001685 3639001685 IN IP4 70.194.68.80\r\ns=pjmedia\r\nc=IN IP4 70.194.68.80\r\nt=0 0\r\nm=audio 3561 RTP/SAVP 3 102 0 101\r\nc=IN IP4 70.194.68.80\r\na=rtcp:3570 IN IP4 70.194.68.80\r\na=sendrecv\r\na=rtpmap:102 ILBC"..., len = 44640720}
        srevp = {0x40, 0x7f0d19ee00d8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, 
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#11 0x000000000046d735 in run_actions (h=0x7fff3b72c390, a=0x7f0d19d480c0, msg=0x7f0d19fde300) at action.c:1548
        t = 0x7f0d19d539c8
        ret = 1
        mod = 0x2a927f8
        ms = 0
        __FUNCTION__ = "run_actions"
#12 0x000000000046de3b in run_top_route (a=0x7f0d19d480c0, msg=0x7f0d19fde300, c=0x0) at action.c:1634
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {2, -4798293054220995169, 4283760, 140734190767264, 0, 0, -4798293054237772385, 4798444165384172959}, __mask_was_saved = 0, __saved_mask = {__val = {
                  4731036416, 140734190765088, 139694165836253, 4294967299, 13, 4611686023719682061, 0, 140734190765136, 139694165837144, 7500873, 0, 4611686023158424352, 139694247371520, 140734190765184, 6150075, 5292344448}}}}}
        p = 0x7fff3b72c390
        ret = 4283760
        sfbk = 0
#13 0x000000000057114c in receive_msg (
    buf=0x2a92770 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 69\r\nf: \"User\" <sip:user at example.co"..., 
    len=1627, rcv_info=0x7f0d0b497e78) at receive.c:196
        msg = 0x7f0d19fde300
        ctx = {rec_lev = 1040826460, run_flags = 0, last_retcode = 189365856, jmp_env = {{__jmpbuf = {139694000669008, 139693811304027, 163208822785, 139694000669008, 6, 139694000669015, 21, 139694000669037}, __mask_was_saved = 7, 
              __saved_mask = {__val = {1, 139694000288152, 1203042652976, 18446603336221212671, 139694000733792, 139694000668384, 4604204945409, 139694057709518, 18446744069414584336, 139694000669046, 1627, 42949673803, 2, 4283760, 
                  140734190767264, 140734190765632}}}}}
        ret = 997379232
        inb = {
          s = 0x2a92770 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 69\r\nf: \"User\" <sip:user at example.co"..., len = 1627}
        __FUNCTION__ = "receive_msg"
#14 0x00000000005f1a03 in receive_tcp_msg (
    tcpbuf=0x7f0d0b498150 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 70\r\nf: \"User\" <sip:user at example.co"..., len=1627, rcv_info=0x7f0d0b497e78, con=0x7f0d0b497e60) at tcp_read.c:1247
        buf = 0x2a92770 "INVITE sip:2201 at example.com SIP/2.0\r\nv: SIP/2.0/TLS 100.91.122.110:38635;rport;branch=z9hG4bKPj0HI65H7Nw2fKknZ-O9zSmeRAPomgE5ts;alias\r\nMax-Forwards: 69\r\nf: \"User\" <sip:user at example.co"...
        bsize = 65535
        blen = 65535
        __FUNCTION__ = "receive_tcp_msg"
#15 0x00000000005f3139 in tcp_read_req (con=0x7f0d0b497e60, bytes_read=0x7fff3b72c780, read_flags=0x7fff3b72c778) at tcp_read.c:1401
        bytes = 1627
        total_bytes = 1627
        resp = 1
        size = 0
        req = 0x7f0d0b497ee0
        dst = {send_sock = 0x14, to = {s = {sa_family = 32352, sa_data = "I\v\r\177\000\000\001 \000\000\360m\376\031"}, sin = {sin_family = 32352, sin_port = 2889, sin_addr = {s_addr = 32525}, sin_zero = "\001 \000\000\360m\376\031"}, 
            sin6 = {sin6_family = 32352, sin6_port = 2889, sin6_flowinfo = 32525, sin6_addr = {__in6_u = {__u6_addr8 = "\001 \000\000\360m\376\031\r\177\000\000\000\000\000", __u6_addr16 = {8193, 0, 28144, 6654, 32525, 0, 0, 0}, 
                  __u6_addr32 = {8193, 436104688, 32525, 0}}}, sin6_scope_id = 997377904}}, id = 32767, proto = 72 'H', send_flags = {f = 127 '\177', blst_imask = 73 'I'}}
        c = 0 '\000'
        ret = 0
        __FUNCTION__ = "tcp_read_req"
#16 0x00000000005f6018 in handle_io (fm=0x7f0d19fe6df0, events=1, idx=-1) at tcp_read.c:1624
        ret = 0
        n = 0
        read_flags = 1
        con = 0x7f0d0b497e60
        s = 0
        resp = 1
        t = 86
        __FUNCTION__ = "handle_io"
#17 0x00000000005e9e02 in io_wait_loop_epoll (h=0xa31740 <io_w>, t=2, repeat=0) at io_wait.h:1061
        n = 1
        r = 0
        fm = 0x7f0d19fe6df0
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#18 0x00000000005f6fbb in tcp_receive_loop (unix_sock=36) at tcp_read.c:1733
        __FUNCTION__ = "tcp_receive_loop"
#19 0x00000000004e8da2 in tcp_init_children () at tcp_main.c:4787
        r = 1
        i = 1
        reader_fd_1 = 36
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\365kJ\000\000\000\000\000\326_0\030\004\000\000\000\200yq\000\000\000\000\000p]A\000\000\000\000\000\326_0\030\000\000\000\000`\311r;\377\177\000\000\\\365Q\000\000\000\000\000\347Mq\000\000\000\000\000`\246\323\031\r\177\000\000\030\000\000\000\031", '\000' <repeats 11 times>, "\263\t\000\000\v\302&o\326_0\030\000\000\000"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#20 0x0000000000511e8e in main_loop () at main.c:1658
        i = 2
        pid = 2483
        si = 0x0
        si_desc = "udp receiver child=1 sock=[2001:55F:CODE:0:0:0:0:3]:5060\000i\253\016\r\177\000\000\001\000\000\000\000\000\000\000\340\212\344\n\r\177\000\000Pa\257\016\r\177\000\000 4\355\031\r\177\000\000\320\063\257\016\r\177\000\000\003\000\000\000\r\177\000\000\060\312r;\377\177\000\000\365kJ\000\000\000\000"
        nrprocs = 2
        __FUNCTION__ = "main_loop"
#21 0x00000000005173e9 in main (argc=7, argv=0x7fff3b72cca8) at main.c:2533
        cfg_stream = 0x29ed010
        c = -1
        r = 0
        tmp = 0x7fff3b72cf3e ""
        tmp_len = 32525
        port = 451908768
        proto = 0
        options = 0x7157a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 2692945643
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x7fff3b72cbe0 ""
        __FUNCTION__ = "main"
```



---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/141
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20150425/abe9bc9b/attachment-0001.html>


More information about the sr-dev mailing list